AP CSP vocab and crap Flashcards

1
Q

a heuristic process may include running tests and getting results by

A

trial and error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the goal of heuristics is to develop a simple process that generates … (or …) results in an …

A

accurate; approximate; acceptable amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

digital certificate is the same thing as

A

public key certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a digital certificate is an electronic … that allows a person, computer, or organization to exchange information securely over the Internet using the

A

public key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a digital certificate provides …., is … resistant and can be … because it was issued by an …, … agency
contains the name of the certificate holder, a … number, … dates, a copy of the certificate holder’s … and the … of the certificate-issuing authority

A

identifying information; forgery; verified; official, trusted; serial; expiration; public key; digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

append: to add at the

A

end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS Subdomain: hostname that belongs to your domain

e.g.

A

about.example.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

selection: a generic term for a type of programming statement (usually an if-statement) that uses a … condition to determine/select whether or not to run a …

A

Boolean; certain block of statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

iterate: to … in order to achieve, or get closer to, a desired goal

A

repeat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

bitmap: an array of … representing the values of … in an image/display

A

binary data; pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

floating-point number:

A

a real number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

statement: directs the computer to perform a …

A

specified action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

expression: a group of …. that represent a

A

symbols; value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

procedure: a set of coded instructions that tell a computer how to

A

run a program/calculation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

protocols: a set of rules governing the … or … of data between devices

A

exchange; transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

stepwise refinement: a top-down process in which the programmer starts with the … of the program and continually … into …

A

overall goal; breaks down the design; sub-functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

transistor: a device used to amplify its …, a … switch and the fundamental building block of ..

A

electrical input; binary; computer circuitry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

motherboard: holds together the …, … and … for … and … devices

A

CPU; memory; connectors; input; output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

procedural abstraction: … model of what we want a subprogram to do

A

mental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

data abstraction: the reduction of a particular body of data to a

A

simplified representation of the whole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

expression: any valid unit of code that resolves to a

A

value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

network switch: computer networking device that connects … on a … by using packet switching to receive, process, and forward data to the destination device

A

devices together; computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

chip can store … or provide …

A

computer memory; logic circuitry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Open Systems Interconnection (OSI model) is a conceptual model that characterizes and standardizes the … functions of a telecommunication or computing system without regard to its underlying … and …

A

communication; internal structure; technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

privatization is the process of transferring an enterprise or industry from the … to the …

A

public sector; private sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

cryptography is the science of … by transforming it into a secure format. It is used to protect …

A

protecting information; digital data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

virus: a type of malicious software program that, when executed, replicates itself by modifying other … and inserting its own…

A

computer programs; code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

major characteristics of viruses: the ability to … itself, and the ability to …. to another …

A

replicate; attach itself; computer file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

a computer virus needs another … in order to be able to be activated and infect other computer files. essentially, a computer virus piggybacks on another file in your computer

A

program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

phishing: a thief trying to trick you into sending them … Typically these include … about … asking you to send your … and …, … or other things

A

sensitive information; emails; system updates; username; password; social security number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

symmetric encryption: a form of computerized cryptography using a singular … to guise an …
its data conversion uses a mathematical algorithm along with a …, which results in the inability to …

A

encryption key; electronic message; secret key; make sense out of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

public key encryption: used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, … It uses an … in which the encryption key is made …, but the decryption key is kept …

A

a secret key; asymmetric encryption scheme; public; private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

vigenere cipher: a method of encrypting alphabetic text by using a series of interwoven … based on the letters of a …

A

Caesar ciphers; keyword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

certificate authority: a trusted entity that issues … that verify a … on the Internet
essential part of secure communication and play an important part in the public key infrastructure

A

electronic documents; digital entity’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

trust model of the internet: users must … if they want them to do anything useful on their computers

A

trust applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

open standards: standards made available to the … and are developed (or approved) and maintained via a … and … driven process

A

general public; collaborative; consensus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

distributed denial of service (DDoS) attack: occurs when … flood the bandwidth/resources of a targeted system, usually one or more … –> often the result of multiple …

A

multiple systems; web servers; compromised systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

denial of service (DOS): an interruption in an authorized user’s …, typically one caused with malicious intent

A

access to a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

404 error: website’s server could not find the … requested by the user

A

URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

DNS spoofing: a type of computer attack wherein a user is forced to navigate to a … disguised to look like a real one, with the intention of diverting … or stealing .. of the users

A

fake website; traffic; credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

firewall: software that runs on … (often …) that only allows traffic through according to some set of …

A

servers; routers; security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

DNS: the service that translates … to …

A

URLs; IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

sequencing: putting commands in … so computers can …

A

correct order; read the commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

network redundancy: having multiple … to ensure … during cases of … or …

A

backups; reliability; high usage; failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Internet Engineering Task Force (IETF): develops and promotes … Internet … and … in particular, the standards that comprise the … (…/…)

A

voluntary; standards; protocols; Internet protocol suite (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

top-level domain: last segment of the domain name, the part that follows immediately after the

A

dot symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

metadata: data that … other data. For example, a digital image may include metadata that describe the … of the image, number of …, or ….

A

describes; size; colors; resolution

48
Q

packets: small chunks of information that have been carefully formed from

A

larger chunks of information

49
Q

packet: contains the … and …in addition to the data

A

destination address; origin address

50
Q

machine learning: a field of computer science that uses … techniques to give computer systems the ability to … with data, without being explicitly programmed

A

statistical; learn

51
Q

low-level programming language provides little/no … from a computer’s instruction set architecture and generally refers to either … or …

A

abstraction; machine code; assembly language

52
Q

high-level language: enables a programmer to write programs that are more or less … of a particular … –> closer to …

A

independent; type of computer; human languages

53
Q

innovation: a new/improved …, …, …, etc, or the … thereof

A

idea; device; product; development

54
Q

binary: a way of representing information using only

A

two options

55
Q

bit: a contraction of …, the single unit of information in a computer, typically represented as a … or …

A

binary digit; 0; 1

56
Q

bandwidth: … measure by …

A

transmission capacity; bit rate

57
Q

bit rate: the number of … that are conveyed or processed per …

A

bits; unit of time

58
Q

latency: time it takes for a bit to

A

travel from its sender to its receiver

59
Q

ASCIII: American Standard Code for Information Interchange; the universally recognized … that any computer can understand

A

raw text format

60
Q

internet: a group of … and … that are connected to each other

A

computers; servers

61
Q

net neutrality: the principle that all Internet traffic should be … by Internet Service Providers

A

treated equally

62
Q

IP Address: a number assigned to any … that is connected to the internet

A

item

63
Q

router: a type of computer that

A

forwards data across a network

64
Q

Transmission Control Protocol (TCP): provides …, …, and … delivery of a stream of … on the internet. Tightly linked with …

A

reliable; ordered; error-checked; packets; IP

65
Q

HyperText Transfer Protocol (HTTP): the protocol used for … over the Internet

A

transmitting web pages

66
Q

URL: an easy-to-remember address for calling a

A

web page

67
Q

lossless compression: a data compression algorithm that allows the original data to be perfectly

A

reconstructed from the compressed data

68
Q

pixel: short for picture element, the fundamental unit of a …, typically a tiny square/dot that contains a single point of color of a larger image

A

digital image

69
Q

RGB: the RGB color model uses varying intensities of Red, Green, and Blue light that are added together to reproduce a

A

broad array of colors

70
Q

lossy compression (irreversible compression): a data compression method that uses …, discarding some data to represent the … Most commonly seen in image formats like …

A

inexact approximations; content; .jpg

71
Q

abstraction: a simplified representation of something more …. allow you to hide details to help you manage …, focus on …., and reason about problems at a …

A

complex; complexity; relevant concepts; higher level

72
Q

pivot table: name of the tool used to create

A

summary tables

73
Q

summary table: a table that shows the results of aggregations performed on data from a …, hence a “…” of larger data

A

larger data set; summary

74
Q

algorithm: a precise sequence of instructions for processes that can be

A

executed by a computer

75
Q

turtle programming: a classic method for learning programming with commands to control … and … of an on-screen robot called a ..

A

movement; drawing; turtle

76
Q

function: a named group of …; reusable … that reduce the complexity of … and … programs

A

programming instructions; abstractions; writing; maintaining

77
Q

API: a collection of … made available to a programmer

A

commands

78
Q

documentation: a description of the behavior of a …, …, …, ….

A

command; function; library; API

79
Q

library: a collection of …/…, typically with a … purpose

A

command; functions; shared

80
Q

parameter: an extra piece of information passed to a function to customize it for a

A

specific need

81
Q

loop: the action of doing something

A

over and over again

82
Q

for loop: loops that have a predetermined …, …, and …

A

beginning; end; increment

83
Q

big data: a broad term of datasets so … or … that traditional data processing applications are …

A

large; complex; inadequate

84
Q

moore’s law: a predication made by Moore in 1965 that computing power will … every 1.5-2 years, it has remained more or less true

A

double

85
Q

caesar cipher: a technique for encryption that shifts the alphabet by some

A

number of characters

86
Q

cracking encryption: when you attempt to decode a secret message without knowing all the …, you are trying to “crack” the encryption

A

specifics of the cipher

87
Q

decryption: a process that reverses …, taking a secret message and reproducing the original plain text

A

encryption

88
Q

encryption: a process of … to keep them secret, so only “authorized” parties can read it

A

encoding messages

89
Q

random substitution cipher: a process of encoding messages to keep them …, so only … can read it

A

secret; authorized parties

90
Q

computationally hard: a hard problem for a computer is one in which it cannot arrive at a … in a …

A

solution; reasonable amount of time

91
Q

assymetric encryption: used in public key encryption, it is scheme in which the key to encrypt data is different from the

A

key to decrypt

92
Q

modulo: a mathematical operation that returns the

A

remainder after integer division (MOD)

93
Q

private key: in an assymetric encryption scheme the decryption key is kept … and never shared, so only the intended recipient has the ability to … a message that has been encrypted with a public key

A

secret; decrypt

94
Q

antivirus software: usually keeps big … of … and … your computer looking for the virus programs in order to get rid of them

A

lists; known viruses; scans

95
Q

SSL/TLS (Secure sockets layer/ transport layer security): an encryption layer of HTTP that uses …. to establish a …

A

public key cryptography; secure connection

96
Q

callback function: a function specified as part of an …; it is written by the … but called by the … as the result of an …

A

event listener; programmer; system; event trigger

97
Q

event-driven program: a program designed to run blocks of code/functions in response to

A

specified events

98
Q

event handling: an overarching term for the coding tasks involved in making a program

A

respond to events by triggering functions

99
Q

event listener: a command that can be set up to trigger a function when a particular type of event occurs on a

A

particular UI element

100
Q

UI element: …, like buttons, images, text boxes, pull down menus, screens and so on

A

on-screen objects

101
Q

User Interface: the … elements of a program through which a user … or … with the application (UI)

A

visual; controls; communicates

102
Q

debugging: … and … problems in an algorithm or program

A

finding; fixing

103
Q

==

A

the equality operator

104
Q

global variable: a variable whose scope is … to the …, it can be used and updated by … of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method

A

global; program; any part of the code

105
Q

fixed variable: a variable that remains

A

constant

106
Q

local variable: a variable with local scope is one that can only be seen, used, and updated by code within … Typically this means the variable was declared inside a …–includes function …

A

the same scope; function; parameter variables

107
Q

variable scope: dictates which portions of the code can “…” or … a variable, typically derived from where the variable was first

A

see; use; created

108
Q

concatenate: to … or … Typically used when … in programming

A

link together; join; joining together text Strings

109
Q

String: any sequence of characters between

A

quotation marks

110
Q

conditionals: statements that only run under

A

certain conditions

111
Q

models and simulations: a program which replicates or mimics key features of a real world event in order to investigate its behavior without the …, …, or … of running an experiment in real life

A

cost; time; danger

112
Q

array: a … in JavaScript used to represent a …

A

data structure; list

113
Q

list: a generic term for a programming data structure that

A

holds multiple items

114
Q

Key Event: in JavaScript an event triggered by … or … a … on the …

A

pressing; releasing; key; keyboard

115
Q

return value: a value sent back by a function to the place in the code where the function was …- typically asking for … or the result of a … or …. of some kind. Most programming languages have many built-in functions that return values, but you can also write your own

A

called from; value; calculation; computation

116
Q

canvas: a user interface element to use in HTML/JavaScript which acts as a …, allowing the programmatic … and manipulation of …, …., … and …

A

digital canvas; drawing; pixels; basic shapes; figures; images